Applied Filters

Description:
This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.

Description:
This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.

Description:
This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.

Description:
This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities.

Description:
This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.

Description:
This report discusses the history of constitutional interpretations and legislative responses relevant to the collection of private information for criminal investigation, foreign intelligence gathering, and national security purposes.

Description:
This report begins with an overview of both the Foreign Intelligence Surveillance Court (FISC) and the Foreign Intelligence Surveillance Act (FISA) Court of Review, including the jurisdiction of these courts, how the judges are appointed, and the FISC’s practices and procedures for reviewing and issuing surveillance orders. The report then discusses the scope and underlying legal principles behind congressional regulation of the procedures of the federal courts, and applies those principles with respect to the various proposals to reform the FISA judicial review process.

Description:
This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general.

Description:
This report examines various provisions of the Patriot Act that were set to expire on December 31, 2005. Their expiration date has been postponed until March 10, 2006. The expiring sections deal with the power of federal authorities to conduct searches and seizures, generally searches and seizures relating to communications.

Description:
This report focuses on cross-cutting management issues that affect the Intelligence Community's (IC's) ability to counter "pervasive and emerging threats" to the United States and balance resources both appropriately and wisely. The Director of National Intelligence (DNI) is charged with integrating the community of intelligence agencies so that they operate effectively as one team.

Description:
This report briefly outlines some of the perspectives reflected in the ongoing debate related to the Foreign Intelligence Surveillance Act (FISA) focusing on three issues: tension between national security and civil liberties, collection of foreign intelligence information from foreign persons, and limitations on liability for telecommunications providers furnishing aid to the government.

Description:
Although the activities involved in homeland security intelligence (HSINT) itself are not new, the relative importance of state, local, and private sector stakeholders; the awareness of how law enforcement information might protect national security; and the importance attached to homeland security intelligence have all increased substantially since the events of September 11, 2001. This report provides a potential conceptual model of how to frame HSINT, including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). While this community may not necessarily be a useful construct from a management perspective, it is nevertheless a community as traditionally defined. Although the HSIC’s members are diffused across the nation, they share a common counterterrorism interest.

Description:
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.

Description:
To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. In December 2004, the Intelligence Reform and Terrorism Prevention Act was signed, providing for a Director of National Intelligence (DNI) with substantial authorities to manage the national intelligence effort. Making cooperation effective presents substantial leadership and managerial challenges. International terrorism in particular presents a difficult analytical challenge. Counterterrorism requires the close coordination of intelligence and law enforcement agencies, but there remain many institutional and procedural issues that complicate cooperation between the two sets of agencies.

Description:
The National Intelligence Council (NIC), composed of some 18 senior analysts and national security policy experts, provides the U.S. intelligence community's best judgments on crucial international issues. It is the purpose of this report to describe the statutory provisions that authorize the NIC, provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.

Description:
This report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight.

Description:
This report discusses encryption export controls, beginning with background on the development and use of encryption, and continuing with a description of export controls imposed under the Arms Export Control Act (AECA) and the Export Administration Act (EAA); a discussion of recent federal court rulings in First Amendment challenges to AECA and EAA regulations; and a summary of 106th Congress legislation aimed at liberalizing law and policy affecting encryption exports.

Description:
Among airborne intelligence, surveillance, and reconaissance (ISR) platforms, the U-2 Dragon Lady and the RQ-4A Global Hawk are especially valuable. This report discusses how best to use existing and planned manned and unmanned ISR aircraft to most effectively satisfy the Department of Defense's (Dod) requirements for timely and accurate information on enemy forces.

Description:
This paper summarizes pending legislation relating to domestic intelligence, briefly explains the jurisdiction and functions of MI-5, and describes some of the factors that may be relevant to a discussion regarding the applicability of the MI-5 domestic intelligence model to the United States.

External Links

Filter: Serial/Series Titles

This dialog allows you to filter your current search.
Each of the Serial/Series Titles listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.

Filter: Years

This dialog allows you to filter your current search.
Each of the Years listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.

Having trouble finding an option within the list of Years? Start typing and we'll update the list to show only those items that match your needs.

Filter: Months

This dialog allows you to filter your current search.
Each of the Months listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.

Filter: Days

This dialog allows you to filter your current search.
Each of the Days listed note their name and the number of records that will be limited down to if you choose that option.
The list can be sorted by name or the count.

Having trouble finding an option within the list of Days? Start typing and we'll update the list to show only those items that match your needs.